The State of Healthcare Cybersecurity in 2025
When I work with healthcare clients, one of the first things I tell them is that I completely understand how diffic…
Critical HP Universal Print Driver Vulnerability — Update Immediately
HP has disclosed a high-severity vulnerability (HPSBPI03995) in its Universal Print Driver (UPD) for Windows, affec…
How To Enable MFA for All Users in Microsoft Entra
Multifactor authentication (MFA) is remarkably effective at blocking cyberattacks. How effective? Well, it’s often …
Cybersecurity Solutions for Education
With a growing list of attacks on educational institutions around the country, we are often asked, “Why are schools…
Top Business Technology Trends for 2025
The past 5 years have been a bumpy ride. Cloud tools that made it possible for companies to work smarter had been a…
The Top Security Threats for SMBs
Many smaller organizations don’t consider themselves to be a target of cybercriminals. The “we’re too small to be w…
What Should You Know About the Chinese Telecom Hack?
Chinese hackers appear to have broken into eight US telecom companies' networks with the primary goal of spying on …
Email Retention Policy Best Practices
Does your business need an email retention policy? If you’re in finance, healthcare, government, or any other heavi…
What Is Social Engineering, and How Is It Used in Cybersecurity Attacks?
Social engineering sounds nice, and in some contexts, it is. Social engineering can mean shaping the development an…